[8/8] netfilter: xt_CT: fix wrong checking in the timeout assignment path

Submitted by Pablo Neira on April 30, 2012, 3:16 p.m.


Message ID 1335799015-2003-9-git-send-email-pablo@netfilter.org
State Accepted
Headers show

Commit Message

Pablo Neira April 30, 2012, 3:16 p.m.
From: Pablo Neira Ayuso <pablo@netfilter.org>

The current checking always succeeded. We have to check the first
character of the string to check that it's empty, thus, skipping
the timeout path.

This fixes the use of the CT target without the timeout option.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
 net/netfilter/xt_CT.c |    2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Patch hide | download patch | download mbox

diff --git a/net/netfilter/xt_CT.c b/net/netfilter/xt_CT.c
index 59530e9..3746d8b 100644
--- a/net/netfilter/xt_CT.c
+++ b/net/netfilter/xt_CT.c
@@ -227,7 +227,7 @@  static int xt_ct_tg_check_v1(const struct xt_tgchk_param *par)
-	if (info->timeout) {
+	if (info->timeout[0]) {
 		typeof(nf_ct_timeout_find_get_hook) timeout_find_get;
 		struct nf_conn_timeout *timeout_ext;